# -*- coding: utf-8 -*- # Part of Odoo. See LICENSE file for full copyright and licensing details. import hashlib from odoo import api, models, _ from odoo.exceptions import UserError class HrEmployee(models.Model): _name = 'hr.employee' _inherit = ['hr.employee', 'pos.load.mixin'] @api.model def _load_pos_data_domain(self, data, config): return config._employee_domain(config.current_user_id.id) @api.model def _load_pos_data_fields(self, config): return ['name', 'user_id', 'work_contact_id'] def _server_date_to_domain(self, domain): return domain @api.model def _load_pos_data_read(self, records, config): # NOTE: # hr.employee have a public fallback mechanism # where users without read access may still receive records from # the corresponding public model (hr.employee.public) so thats why we are bypassing # the access right. fields = self._load_pos_data_fields(config) read_records = records.read(fields, load=False) manager_ids = records.filtered(lambda emp: config.group_pos_manager_id.id in emp.user_id.all_group_ids.ids).ids employees_barcode_pin = records.get_barcodes_and_pin_hashed() bp_per_employee_id = {bp_e['id']: bp_e for bp_e in employees_barcode_pin} for employee in read_records: if employee['id'] in manager_ids: role = 'manager' employee['_user_role'] = 'admin' elif employee['id'] in config.advanced_employee_ids.ids: role = 'manager' elif employee['id'] in config.minimal_employee_ids.ids: role = 'minimal' else: role = 'cashier' employee['_role'] = role employee['_barcode'] = bp_per_employee_id[employee['id']]['barcode'] employee['_pin'] = bp_per_employee_id[employee['id']]['pin'] return read_records def get_barcodes_and_pin_hashed(self): if not self.env.user.has_group('point_of_sale.group_pos_user'): return [] # Apply visibility filters (record rules) visible_emp_ids = self.search([('id', 'in', self.ids)]) employees_data = self.sudo().search_read([('id', 'in', visible_emp_ids.ids)], ['barcode', 'pin']) for e in employees_data: e['barcode'] = hashlib.sha1(e['barcode'].encode('utf8')).hexdigest() if e['barcode'] else False e['pin'] = hashlib.sha1(e['pin'].encode('utf8')).hexdigest() if e['pin'] else False return employees_data @api.ondelete(at_uninstall=False) def _unlink_except_active_pos_session(self): configs_with_employees = self.env['pos.config'].sudo().search([('module_pos_hr', '=', True)]).filtered(lambda c: c.current_session_id) configs_with_all_employees = configs_with_employees.filtered(lambda c: not c.basic_employee_ids and not c.advanced_employee_ids and not c.minimal_employee_ids) configs_with_specific_employees = configs_with_employees.filtered(lambda c: (c.basic_employee_ids or c.advanced_employee_ids or c.minimal_employee_ids) & self) if configs_with_all_employees or configs_with_specific_employees: error_msg = _("You cannot delete an employee that may be used in an active PoS session, close the session(s) first: \n") for employee in self: config_ids = configs_with_all_employees | configs_with_specific_employees.filtered(lambda c: employee in c.basic_employee_ids) if config_ids: error_msg += _("Employee: %(employee)s - PoS Config(s): %(config_list)s \n", employee=employee.name, config_list=config_ids.mapped("name")) raise UserError(error_msg)